Table of contents
SCALANCE W760/W720 to IEEE 802.11n Command Line Interface
12 Configuration Manual, 11/2014, C79000-G8976-C351-03
7.8 ARP ...................................................................................................................................... 340
7.8.1 show ip arp ........................................................................................................................... 340
7.9 SSH server ........................................................................................................................... 341
7.9.1 show ip ssh .......................................................................................................................... 342
7.9.2 Commands in the Global Configuration mode ..................................................................... 342
7.9.2.1 ssh-server ............................................................................................................................ 342
7.9.2.2 no ssh-server ....................................................................................................................... 343
8 Load control ......................................................................................................................................... 345
8.1 Dynamic MAC aging ............................................................................................................ 345
8.1.1 show mac-address-table aging-time .................................................................................... 345
8.1.2 show mac-address-table aging-status ................................................................................. 346
8.1.3 Commands in the global configuration mode ...................................................................... 346
8.1.3.1 mac-address-table aging-time ............................................................................................. 346
9 Layer 3 functions ................................................................................................................................. 349
9.1 NAT ...................................................................................................................................... 349
9.1.1 show nat (client) ................................................................................................................... 349
9.1.2 Commands in the global configuration mode ...................................................................... 350
9.1.2.1 nat (client) ............................................................................................................................ 350
9.1.3 Commands in the NAT configuration mode ......................................................................... 351
9.1.3.1 nat (client) ............................................................................................................................ 351
9.1.3.2 no nat (client) ....................................................................................................................... 353
9.1.3.3 nat local ip address (client) .................................................................................................. 354
9.1.3.4 nat interface (client) ............................................................................................................. 355
9.1.3.5 no nat interface (client) ........................................................................................................ 356
9.1.3.6 nat timeout (client) ............................................................................................................... 356
9.1.3.7 no nat timeout (client) .......................................................................................................... 358
10 Security and authentication .................................................................................................................. 359
10.1 User rights management ...................................................................................................... 359
10.1.1 whoami ................................................................................................................................. 359
10.1.2 show users ........................................................................................................................... 360
10.2 WLAN ................................................................................................................................... 360
10.2.1 show wlan security ............................................................................................................... 361
10.2.2 show wlan security ap-radius-authenticator (Access Point) ................................................ 361
10.2.3 show wlan security keys ...................................................................................................... 362
10.2.4 Commands in the WLAN configuration mode ...................................................................... 363
10.2.4.1 wlan security ap-radius-authenticator .................................................................................. 363
10.2.4.2 no wlan security ap-radius-authenticator ............................................................................. 364
10.2.4.3 wlan security ap-radius-authenticator address .................................................................... 365
10.2.4.4 wlan security ap-radius-authenticator max-retransmit ......................................................... 366
10.2.4.5 wlan security ap-radius-authenticator port-number ............................................................. 367
10.2.4.6 wlan security ap-radius-authenticator primary ..................................................................... 368
10.2.4.7 no wlan security ap-radius-authenticator primary ................................................................ 369
10.2.4.8 wlan security ap-radius-authenticator reauth-interval .......................................................... 370
10.2.4.9 wlan security ap-radius-authenticator reauth-mode............................................................. 371
10.2.4.10 wlan security ap-radius-authenticator shared-secret ........................................................... 372
10.2.5 Commands in the WLAN Interface configuration mode ...................................................... 373
10.2.5.1 wlan security authentication (client) ..................................................................................... 374
10.2.5.2 wlan security cipher (client) .................................................................................................. 376